Message ID | 1699484212-24079-1-git-send-email-longli@linuxonhyperv.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b129:0:b0:403:3b70:6f57 with SMTP id q9csp94135vqs; Wed, 8 Nov 2023 14:57:51 -0800 (PST) X-Google-Smtp-Source: AGHT+IHwML/XjAlPgMmysjigK6oHzOzZKyk9aWdN7g5IUDRr3ZIRIsxwxrmFk8cI5ybQ/UmKvQTx X-Received: by 2002:a17:902:d486:b0:1cc:87f8:96b6 with SMTP id c6-20020a170902d48600b001cc87f896b6mr4023745plg.66.1699484270777; Wed, 08 Nov 2023 14:57:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1699484270; cv=none; d=google.com; s=arc-20160816; b=UepzB7RfuvDAloMd/z+IY51d42OH9LztANVpIKG/cOINDMwGVXUs7DDulF8vcyts7s oBEULv4BhkD2zaVBZUlDPcvtYG6FUglx5fcbL0zRIzws72KFWgn+FS+sKvMVK/viokIT D7jAeFpjnTTBTKKFXUrVyJwyyZn30wAO0bO88K7Dmtrj052qSWI77fLgrQtgRIOOTSdk zOLp+Fe1o7MfuUx86fJiaXgId0ffNNdfpaPy3Ruhpo0AUB3VYQHia1xSqofbIi7ZoCEG YBNX0DSqqgf3g3f479z/BzrIA21FVXgOlkK+nVtWmpbkvjfhHTXD4y3fjSLBII7XA4J+ fjlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=7KYB4AGHIgeUyjEG3r33fMLYHpsuUr24nqIpPaxvALs=; fh=3JPFMrNsIuDanFY1RD/GwMR1715l2SJPmDW+zclM96o=; b=TgcTLhzpmlZwxYwkcZSk/lwU6binSuhDWbhW8gx5RZKCyZNd41pvJBmZ7NVWFyHNny hRv46xP1EpyDlT+wIW0Dl4Mtzb62OBPNg8DeE3FU5dfWUhWdTg+iP5iqY0GLB/iezRCD IPtwsy5VtAKMWrrbRHv5N7f9SEsFRFvsUp9I+5qZCGoMecJWfHRS6NYRmTe+7l9pqFdw TrRp1ZAf2FeJn+h0gRMFcADfXcuOV8YqC64nods39k/ErcN8Gyu0j9AfLYATEpLXOWGS 9JKa/w/3/FKAZYmWo3pj94dJvL5QjqGIxd8rlxTFwukBN3R/ReeOmJMMec8yq3Tr7hnK MACQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxonhyperv.com header.s=default header.b=gmeLGiqv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxonhyperv.com Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id q3-20020a17090311c300b001c46467a211si3449432plh.193.2023.11.08.14.57.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 08 Nov 2023 14:57:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxonhyperv.com header.s=default header.b=gmeLGiqv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxonhyperv.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 9CB4C8088A4D; Wed, 8 Nov 2023 14:57:34 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230433AbjKHW5F (ORCPT <rfc822;jaysivo@gmail.com> + 32 others); Wed, 8 Nov 2023 17:57:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34688 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229565AbjKHW5E (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 8 Nov 2023 17:57:04 -0500 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 15CDD2593; Wed, 8 Nov 2023 14:57:02 -0800 (PST) Received: by linux.microsoft.com (Postfix, from userid 1004) id 7869120B74C0; Wed, 8 Nov 2023 14:57:01 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 7869120B74C0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxonhyperv.com; s=default; t=1699484221; bh=7KYB4AGHIgeUyjEG3r33fMLYHpsuUr24nqIpPaxvALs=; h=From:To:Cc:Subject:Date:From; b=gmeLGiqvhMbZMueKyf0oZCuXCNcMPao+Y5KJTtTUBNXAMeus2JyaCLqJCmxtbhl+a Z6zVoiq70QfWZeOqFrj7qvAbSrRGn95H3lxjcIFrI6RN+/rWsX10ALLVxBXsj3Zkji 9HjAqZFCeNKWJ1o5oVINYSAxbRUvmzU+GNyiv/jY= From: longli@linuxonhyperv.com To: "K. Y. Srinivasan" <kys@microsoft.com>, Haiyang Zhang <haiyangz@microsoft.com>, Wei Liu <wei.liu@kernel.org>, Dexuan Cui <decui@microsoft.com>, "David S. Miller" <davem@davemloft.net>, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>, linux-hyperv@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Long Li <longli@microsoft.com> Subject: [PATCH net-next v4] hv_netvsc: Mark VF as slave before exposing it to user-mode Date: Wed, 8 Nov 2023 14:56:52 -0800 Message-Id: <1699484212-24079-1-git-send-email-longli@linuxonhyperv.com> X-Mailer: git-send-email 1.8.3.1 Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 08 Nov 2023 14:57:34 -0800 (PST) X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1782035289673543591 X-GMAIL-MSGID: 1782038418556372044 |
Series |
[net-next,v4] hv_netvsc: Mark VF as slave before exposing it to user-mode
|
|
Commit Message
longli@linuxonhyperv.com
Nov. 8, 2023, 10:56 p.m. UTC
From: Long Li <longli@microsoft.com> When a VF is being exposed form the kernel, it should be marked as "slave" before exposing to the user-mode. The VF is not usable without netvsc running as master. The user-mode should never see a VF without the "slave" flag. An example of a user-mode program depending on this flag is cloud-init (https://github.com/canonical/cloud-init/blob/19.3/cloudinit/net/__init__.py) When scanning interfaces, it checks on if this interface has a master to decide if it should be configured. There are other user-mode programs perform similar checks. This commit moves the code of setting the slave flag to the time before VF is exposed to user-mode. Signed-off-by: Long Li <longli@microsoft.com> --- Change since v1: Use a new function to handle NETDEV_POST_INIT. Change since v2: Add "net" in subject. Add more details on the user-mode program behavior. Change since v3: Change target to net-next. drivers/net/hyperv/netvsc_drv.c | 24 +++++++++++++++++------- 1 file changed, 17 insertions(+), 7 deletions(-)
Comments
On Wed, 8 Nov 2023 14:56:52 -0800 longli@linuxonhyperv.com wrote: > From: Long Li <longli@microsoft.com> > > When a VF is being exposed form the kernel, it should be marked as "slave" > before exposing to the user-mode. The VF is not usable without netvsc running > as master. The user-mode should never see a VF without the "slave" flag. > > An example of a user-mode program depending on this flag is cloud-init > (https://github.com/canonical/cloud-init/blob/19.3/cloudinit/net/__init__.py) Quick grep for "flags", "priv" and "slave" doesn't show anything. Can you point me to the line of code? > When scanning interfaces, it checks on if this interface has a master to > decide if it should be configured. There are other user-mode programs perform > similar checks. > > This commit moves the code of setting the slave flag to the time before VF is > exposed to user-mode. > Change since v3: > Change target to net-next. You don't consider this a fix? It seems like a race condition. > - if (ether_addr_equal(vf_netdev->perm_addr, ndev->perm_addr)) { > - netdev_notice(vf_netdev, > - "falling back to mac addr based matching\n"); > + if (ether_addr_equal(vf_netdev->perm_addr, ndev->perm_addr) || > + ether_addr_equal(vf_netdev->dev_addr, ndev->perm_addr)) This change doesn't seem to be described in the commit message. Please note that we have a rule against reposting patches within 24h: https://www.kernel.org/doc/html/next/process/maintainer-netdev.html#resending-after-review
> Subject: Re: [PATCH net-next v4] hv_netvsc: Mark VF as slave before exposing it > to user-mode > > On Wed, 8 Nov 2023 14:56:52 -0800 longli@linuxonhyperv.com wrote: > > From: Long Li <longli@microsoft.com> > > > > When a VF is being exposed form the kernel, it should be marked as "slave" > > before exposing to the user-mode. The VF is not usable without netvsc > > running as master. The user-mode should never see a VF without the "slave" > flag. > > > > An example of a user-mode program depending on this flag is cloud-init > > (https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit > > hub.com%2Fcanonical%2Fcloud- > init%2Fblob%2F19.3%2Fcloudinit%2Fnet%2F__i > > > nit__.py&data=05%7C01%7Clongli%40microsoft.com%7C5fd05bce17d2471c74c > 00 > > > 8dbe0c9728b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63835092 > 80435 > > > 56592%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz > IiLCJB > > > TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=zAL2hc8338ci8Tl5 > ktZjk > > mWZKCKWMqa%2BGlsE7Ty9g00%3D&reserved=0) > > Quick grep for "flags", "priv" and "slave" doesn't show anything. > Can you point me to the line of code? I'm sorry, The URL I put in the commit should be: (I didn't realize the change has not been merged, here is the buggy code) https://github.com/canonical/cloud-init/blob/3f515387142007fe0992a45486a1e049198a82f2/cloudinit/net/__init__.py#L1094 The code above needs to work with and without netvsc (the possible master device) present. It doesn't work properly with both conditions as of today. The patch series (with Haiyang's patches) fix that. Because the code is specific to HyperV, we know we could be handling a VF NIC that is possibly a slave device, so checking on "slave" flag is a reliable indication whether the VF should be handled. The current workflow in the kernel looks like this: 1. VF net device is created and expose to user-mode 2. VF is bonded to NETVSC (if NETVSC exists on the system) With the current kernel behavior, the user-mode can possibly see the VF after 1, and before 2 when VF is bonded. When this happens, the user-mode doesn't know if the VF will be bonded in the future (it may never happen on systems without NETVSC). In this case, it doesn't know if it should configure the VF or not. > > > When scanning interfaces, it checks on if this interface has a master > > to decide if it should be configured. There are other user-mode > > programs perform similar checks. > > > > This commit moves the code of setting the slave flag to the time > > before VF is exposed to user-mode. > > > Change since v3: > > Change target to net-next. > > You don't consider this a fix? It seems like a race condition. I will work with Haiyang to get patch sent in a series. Thanks, Long
On Fri, 10 Nov 2023 00:43:55 +0000 Long Li wrote: > The code above needs to work with and without netvsc (the possible > master device) present. I don't think that's a reasonable requirement for the kernel code. The auto-bonding already puts the kernel into business of guessing policy, which frankly we shouldn't be in. Having the kernel guess even harder that there will be a master, but it's not there yet, is not reasonable.
On Fri, 10 Nov 2023 12:05:13 -0800 Jakub Kicinski <kuba@kernel.org> wrote: > On Fri, 10 Nov 2023 00:43:55 +0000 Long Li wrote: > > The code above needs to work with and without netvsc (the possible > > master device) present. > > I don't think that's a reasonable requirement for the kernel code. > > The auto-bonding already puts the kernel into business of guessing > policy, which frankly we shouldn't be in. > > Having the kernel guess even harder that there will be a master, > but it's not there yet, is not reasonable. > I wrote the netvsc automatic VF code almost six years ago. So let me give a little history. The original support of VF's was done by using a bonding device and script. Haiyang worked hard to get to work but it could not work on many distro's and had lots of races and problems. Jakub is right that in an ideal world, this could all be managed by userspace. But the management of network devices in Linux is a dumpster fire! Every distro invents there own solution, last time I counted there were six different tools claiming to be the "one network device manager to rule them all". And that doesn't include all the custom scripts and vendor appliances. The users requirements were: - VF networking should work out of the box - VF networking should require no userspace changes - It must work with legacy enterprise distro's - The first network device must show up as eth0 and it must work. The Linux ecosystem of userspace but the kernel is a common base. It was much easier for Microsoft to tell partners to "use these upstream kernel components" and it will work. Windows and BSD OS's have a tight binding between kernel and management from userspace, therefore it is possible to handle things in userspace. There are still problems (as Long indicated in the patch) because the VF device does appear in the list of network devices. And getting the transparent VF support to work in the face of all the trash of userspace scripts is hard. Part of the problem is that the state model of Linux network devices is fractured and poorly documented. The IFF_SLAVE flag is already used to indicate device is managed by another driver. It keeps IPv6 from doing local address assignment and existing userspace should be looking at it. The problem was that userspace must not see a non-flagged VF device, or it will get confused. Microsoft should have exposed only one device in hardware. Other vendors only expose the VF device and hairpin packets any pre-processed packets. Part of the problem here is that VF firmware needs to be updated (too often) and it is a requirement that VM's do not lose connectivity. Ideally, several things should happen: - Linux should support hiding devices managed by another device - the naming of device roles needs to not be master/slave.
On Wed, 15 Nov 2023 08:14:06 -0800 Stephen Hemminger wrote: > Jakub is right that in an ideal world, this could all be managed by > userspace. But the management of network devices in Linux is a > dumpster fire! Every distro invents there own solution, last time > I counted there were six different tools claiming to be the > "one network device manager to rule them all". And that doesn't > include all the custom scripts and vendor appliances. To be clear, I thought Long Li was saying that the goal is work around cases where VF is probed before netvsc. That seems like something that can be prevented by the hypervisor.
> On Wed, 15 Nov 2023 08:14:06 -0800 Stephen Hemminger wrote: > > Jakub is right that in an ideal world, this could all be managed by > > userspace. But the management of network devices in Linux is a > > dumpster fire! Every distro invents there own solution, last time I > > counted there were six different tools claiming to be the "one network > > device manager to rule them all". And that doesn't include all the > > custom scripts and vendor appliances. > > To be clear, I thought Long Li was saying that the goal is work around cases where > VF is probed before netvsc. That seems like something that can be prevented by > the hypervisor. Hi Jakub, I think you misunderstood my response, here is the response again. (quote) The current workflow in the kernel looks like this: 1. VF net device is created and expose to user-mode 2. VF is bonded to NETVSC (if NETVSC exists on the system) With the current kernel behavior, the user-mode can possibly see the VF after 1, and before 2 when VF is bonded. When this happens, the user-mode doesn't know if the VF will be bonded in the future (it may never happen on systems without NETVSC). In this case, it doesn't know if it should configure the VF or not. (end quote) The problem is not that VF could be probed before netvsc. The problem is that it's possible that VF is probed, exposed to user-mode earlier than netvsc has a chance to bond it. Thanks, Long
diff --git a/drivers/net/hyperv/netvsc_drv.c b/drivers/net/hyperv/netvsc_drv.c index ec77fb9dcf89..fdad58dcc6a8 100644 --- a/drivers/net/hyperv/netvsc_drv.c +++ b/drivers/net/hyperv/netvsc_drv.c @@ -2206,9 +2206,6 @@ static int netvsc_vf_join(struct net_device *vf_netdev, goto upper_link_failed; } - /* set slave flag before open to prevent IPv6 addrconf */ - vf_netdev->flags |= IFF_SLAVE; - schedule_delayed_work(&ndev_ctx->vf_takeover, VF_TAKEOVER_INT); call_netdevice_notifiers(NETDEV_JOIN, vf_netdev); @@ -2320,11 +2317,9 @@ static struct net_device *get_netvsc_byslot(const struct net_device *vf_netdev) */ list_for_each_entry(ndev_ctx, &netvsc_dev_list, list) { ndev = hv_get_drvdata(ndev_ctx->device_ctx); - if (ether_addr_equal(vf_netdev->perm_addr, ndev->perm_addr)) { - netdev_notice(vf_netdev, - "falling back to mac addr based matching\n"); + if (ether_addr_equal(vf_netdev->perm_addr, ndev->perm_addr) || + ether_addr_equal(vf_netdev->dev_addr, ndev->perm_addr)) return ndev; - } } netdev_notice(vf_netdev, @@ -2332,6 +2327,19 @@ static struct net_device *get_netvsc_byslot(const struct net_device *vf_netdev) return NULL; } +static int netvsc_prepare_slave(struct net_device *vf_netdev) +{ + struct net_device *ndev; + + ndev = get_netvsc_byslot(vf_netdev); + if (!ndev) + return NOTIFY_DONE; + + /* set slave flag before open to prevent IPv6 addrconf */ + vf_netdev->flags |= IFF_SLAVE; + return NOTIFY_DONE; +} + static int netvsc_register_vf(struct net_device *vf_netdev) { struct net_device_context *net_device_ctx; @@ -2753,6 +2761,8 @@ static int netvsc_netdev_event(struct notifier_block *this, return NOTIFY_DONE; switch (event) { + case NETDEV_POST_INIT: + return netvsc_prepare_slave(event_dev); case NETDEV_REGISTER: return netvsc_register_vf(event_dev); case NETDEV_UNREGISTER: